Communication platforms play a major role in data breach risks

Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools. When it comes to cybersecurity, communicating means more than just talking to another person; it includes any […]

The post Communication platforms play a major role in data breach risks appeared first on Security Intelligence.

Continue reading Communication platforms play a major role in data breach risks

IT specialist Jack Teixeira jailed for 15 years after leaking classified military documents on Discord

Jack Teixeira, the 22-year-old former Air National Guardsman who leaked hundreds of classified documents online, has been sentenced to 15 years in prison.

Teixeira, who served as an IT specialist at Otis Air National Guard Base in Massachusetts, was… Continue reading IT specialist Jack Teixeira jailed for 15 years after leaking classified military documents on Discord

Smashing Security podcast #393: Who needs a laptop to hack when you have a Firestick?

Arion Kurtaj, a teenager from the UK, amassed a fortune through audacious cybercrimes. From stealing Grand Theft Auto 6 secrets to erasing Brazil’s COVID vaccination data, his exploits were legendary. But his hacking spree took a bizarre turn when he w… Continue reading Smashing Security podcast #393: Who needs a laptop to hack when you have a Firestick?

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM’s 2024 Cost of a Data Breach report. This underscores the need for robust IT […]

The post Exploring DORA: How to manage ICT incidents and minimize cyber threat risks appeared first on Security Intelligence.

Continue reading Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

Smashing Security podcast #392: Pasta spies and private eyes, and are you applying for a ghost job?

A Facebook friend request leads to arrest, Twitter scams ride again via promoted ads, and adult websites expose their members. Oh, and Graham finds out what Rule 34 is.

All this and more is discussed in the latest edition of the award-winning “Smash… Continue reading Smashing Security podcast #392: Pasta spies and private eyes, and are you applying for a ghost job?

Identity-related data breaches cost more than average incidents

Identity-related data breaches are more severe and costly than run-of-the-mill incidents, according to RSA. 40% of respondents reported an identity-related security breach. Of those, 66% reported it as a severe event that affected their organization. 4… Continue reading Identity-related data breaches cost more than average incidents

Skills shortage directly tied to financial loss in data breaches

The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM’s 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year. And that’s expensive. This skills deficit adds an average of $1.76 million in […]

The post Skills shortage directly tied to financial loss in data breaches appeared first on Security Intelligence.

Continue reading Skills shortage directly tied to financial loss in data breaches